Microsoft 365 Azure
Microsoft 365 authentication can be configured to authenticate users when logging into the HelpMaster web portal. This is done through a Microsoft App registration that is created in your Azure tenant (by you). HelpMaster will use this app to authenticate the user via OAuth using their Microsoft 365 (M365) account. Your Azure administrator will need to create this App registration and a Client secret (app password) to enable authentication with M365 accounts.
In early January 2026 Microsoft unexpectedly enforced their new minimum OAuth2 2.0 endpoint enhanced security requirements in Microsoft Edge browser. This caused Microsoft authentication to fail in our web portal with a “404 Error”. This has been rectified in HelpMaster v25.10.30 and above. If you are experiencing this error please upgrade HelpMaster to the latest version available which will resolve this problem. In addition to this, please ensure that Steps 2 to 4 below are correctly configured or an error may still occur.
Permissions checklist!
To complete this step, you will need:
- Azure administrative access (https://portal.azure.com)
- HelpMaster administrative access
Once this has been created and configured, you will need to copy the app configuration details from your Azure tenant and copy them into the HelpMaster Desktop location, Web toolbar > Web Settings icon > Web logins tab > External Authentication Providers section, so that the HelpMaster web portal can use it to authenticate. Each web portal user will also have to enable the Microsoft External login option from their Account settings while logged into the web portal.
Step 1 - Create and configure your Microsoft HelpMaster Web Portal App
- Log in to your Microsoft Azure Portal at portal.azure.com with an administrator account
- Navigate to Azure Active Directory > App Registrations
- Click New registration
- Enter a name. eg. HelpMaster Web Authentication
- Select the scope of the accounts that you would like to grant access to. To limit access only to your Azure tenant then select the first option, Accounts in this organizational directory only ([Your org] - Single tenant)
- Under Redirect URI (optional), select the Web platform (Note that this is NOT optional for this configuration)
- In the Redirect URIs box, type the base url to your HelpMaster web portal and add /signin-microsoft to the end of it

- Click Register to create the app registration
Step 2 - Authentication (Preview)
- From the navigation bar select Authentication (Preview)
- Select the Settings tab at the top and you will be presented with the following screen

- Ensure that ID tokens (used for implicit and hybrid flows) is selected
- In the Front-channel logout URL box, enter your base url to your HelpMaster web portal and add /account/logout to the end of it. This will ensure that when logging out of Windows using a Cloud Only Entra ID login, you will also be logged out of the web portal and concurrent (floating) licenses will be instantly freed up for other users
- You can also change the scope of Supported account types here if you wish
- Leave the remaining default options and click Save
Step 3 - Create a Client Secret
In order to be able to use the app within HelpMaster, you need to configure a Client Secret for the app.
- Click Certificates & secrets from the left-side menu
- Click New client secret
This is the only opportunity you will have to copy this secret, so ensure that you do it at this step. If you navigate away from this tab/page/panel, you will lose the opportunity to copy the secret and you will have to create a new secret
- A dialog box will appear prompting for a Description of the secret. This is a descriptive label only - it isn’t the secret. Enter the descriptive name and set the expiry to your preference. Note that if the secret expires, M365 authentication of the HelpMaster web portal will stop working. You will then need to create a new secret and re-enter this value into HelpMaster. Click Add

- Copy the secret from the Value column - click on the copy icon, or select and copy it manually. Save the secret somewhere safe for pasting into HelpMaster in step 4 below

Step 4 - Token Configuration
Due to changes by Microsoft enforcing their new minimum OAuth2 2.0 endpoint enhanced security requirements in Microsoft Edge browser, to extract EntraID family_name and given_name as separate fields, optional claims must be manually added to achieve this.
- From the navigation bar select Token configuration

- Click + Add optional claim and select Token type as ID which will present a list
- Select the Claim types family_name and given_name followed by Add
- These additional tokens require OpenID Connect GraphAPI permissions so tick the checkbox “Turn on the Microsoft Graph profile permissions (required for claims to appear in token)” and click Add again as shown below

Step 5 - Grant API Permissions
Once the app has been created, you will need to configure what Graph API permissions it will have access to. The minimum permissions that the HelpMaster web portal requires is access to read user profiles (User.Read) information so as to find the user trying to authenticate.
| Functionality | Permission Required | Permission Type |
|---|---|---|
| Sign in and read M365 user profile | User.Read | Delegated |
| Grant Microsoft OAuth2 family_name / given_name token access | profile | Delegated |
- Click View API Permissions (if you’re still on the initial screen, or API Permissions from the left-side menu)
- Click Add a permission
- From the Request API permissions panel, click the top panel Microsoft Graph
- Click on Delegated permissions at the top and scroll down to the User section and expand it
- Select (tick) User.Read (Sign in and read user profile)
- If you skipped Step 4.4 above, also scroll to OpenId permissions (1) and select (tick) profile (Allows the app to see your users’ basic profile (e.g., name, picture, user name, email address))
- Click Add permissions

Once the API permissions have been granted to the HelpMaster web portal app, you may also wish to grant admin consent for all users within your Azure tenant, so that they do not have to consent themselves. Granting admin consent is not required but each user will have to consent to using their own Microsoft account if admin consent is not granted.
- To Grant admin consent for [Your Organization] click the option and Yes to the confirmation prompt

Microsoft 365 may take 20 to 60 minutes for these permissions to take effect. Do not conclude that it is not working until you have waited at least 60 minutes after completing ALL steps on this page
Step 6 - Copy the app details into HelpMaster
The final step is to copy the configuration details from your Azure portal app registration into the HelpMaster Desktop app at Administration toolbar > System Administration icon > System Integration section > Microsoft Azure navbar > Microsoft external authentication for the web portal section, so that the HelpMaster web portal can use it to authenticate.
- Check (tick) the Allow Microsoft external authentication box to enable the provider
- Copy the Application (client) ID from the app registration’s Overview page, to HelpMaster’s Application (client) ID field

- Copy the Client secret saved in step 3 into the Client secret field
- Select What type of Microsoft accounts are allowed to authenticate depending upon the scope you require
- If Only Microsoft accounts within an Azure Active Directory (Tenant ID endpoint) is chosen then select the Microsoft Graph national cloud corresponding to your location
a) Microsoft Graph global service (Default) for all countries except USA & China
b) Microsoft Graph for US Government L4 for the US national cloud
c) Microsoft Graph for US Government L5 (DOD) for the US DOD secure cloud
d) Microsoft Graph China (operated by 21Vianet) for the Chinese national cloud - Click OK to save your configuration
If all is configured correctly, clicking the Microsoft button (from the web portal login screen) should now seamlessly log you into the web portal using your Microsoft 365 credentials as long as your Work or school account has been added to Windows.
Revoking Microsoft external login
- Login to the HelpMaster web portal
- From the My Account drop-down select Account settings followed by External logins

- Click on the Remove button next to the Microsoft registered login

See also
Microsoft 365 web authentication for HelpMaster v21 & v22
Add work or school accounts to your PC
Register an application with the Microsoft identity platform
Create a new Microsoft 365 application access policy
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.